Filters








249 Hits in 4.4 sec

Vulnerable Path Attack and its Detection

2017 KSII Transactions on Internet and Information Systems  
In this attack strategy, an attacker first analyzes the contents of web pages and subsequently measures the actual response time of each webpage to build a web-resource-weighted-directed graph.  ...  A detection mechanism for such attack is also proposed and discussed. A finite-state machine is used to model the dynamical processes for the state of the user's session and monitor the PVB attacks.  ...  Weighted Directed Graph Our illustrative study uses the website of Sun Yat-sen University. The web crawler Heritrix is used to fetch the pages of the website of Sun Yat-sen University.  ... 
doi:10.3837/tiis.2017.04.018 fatcat:hnurkcbbynfsdb5zojocfc7r7u

Application-Layer DDOS Detection Based on a One-Class Support Vector Machine

Chuyu She, Wushao Wen, Zaihua Lin, Kesong Zheng
2017 International journal of network security and its applications  
Then, we build normal users' browsing models by using OC-SVM. Finally, we use these models to detect application-layer DDoS attacks.  ...  This kind of attacks is more difficult to prevent than other kinds of DDoS attacks.  ...  NUMERICAL RESULTS Datasets To validate our defence method, we used the web-logs of the website of Sun Yat-sen University. The logs were collected on 10/4/2013.  ... 
doi:10.5121/ijnsa.2017.9102 fatcat:i5pygo5pdzgrdbknzjwboavfn4

A Blockchain-Assisted Trust Access Authentication System for Solid

Ting Cai, Zetao Yang, Wuhui Chen, Zibin Zheng, Yang Yu
2020 IEEE Access  
The Solid (Social Linked Data) project focuses on data sharing and privacy security and aims to build a decentralized ecosystem that radically changes the way web applications work today.  ...  Specifically, we explore to integrate threshold RSA signatures in a permissioned blockchain system to enable a fault-tolerant distributed signature scheme, thereby enhancing the resilience and robustness  ...  This project aims to build a decentralized ecosystem for current social web applications, where the data are completely owned by users themselves who can allow external applications how to use it for certain  ... 
doi:10.1109/access.2020.2987608 fatcat:5uhfyi3qxbdczi57hejdsoyequ

WEB-BASED INFORMATION MANAGEMENT SYSTEM FOR THE LONG TERM ECOLOGICAL RESEARCH PROGRAM IN KENTING, TAIWAN

Yang-Chi Chang, Meng-Tsung Lee, Kun-Chi Lai
2008 Journal of Marine Science and Technology  
This paper introduces a web-based information management system which has been set up as a collaborative facility to allow key environmental and ecological information access for the Long Term Ecological  ...  Web DBMS is to provide the fundamental data transaction and query, while DW is to support advanced data query by aggregating available datasets.  ...  In the current system, OWC is used to insert a pivot table and a pivot chart in the web page.  ... 
doi:10.51400/2709-6998.2001 fatcat:ik72p3deqvhxzpjxj5lprxf53i

CavityPlus: a web server for protein cavity detection with pharmacophore modelling, allosteric site identification and covalent ligand binding ability prediction

Youjun Xu, Shiwei Wang, Qiwan Hu, Shuaishi Gao, Xiaomin Ma, Weilin Zhang, Yihang Shen, Fangjin Chen, Luhua Lai, Jianfeng Pei
2018 Nucleic Acids Research  
CavityPlus is a web server that offers protein cavity detection and various functional analyses.  ...  CavPharmer uses a receptor-based pharmacophore modelling program, Pocket, to automatically extract pharmacophore features within cavities.  ...  for their helpful discussion and test on the CavityPlus web server.  ... 
doi:10.1093/nar/gky380 pmid:29750256 pmcid:PMC6031032 fatcat:nq4jv4ne7veflaa3d46ulyc6mm

cano-wgMLST_BacCompare: A Bacterial Genome Analysis Platform for Epidemiological Investigation and Comparative Genomic Analysis

Yen-Yi Liu, Ji-Wei Lin, Chih-Chieh Chen
2019 Frontiers in Microbiology  
We imposed this tool on a designated web server, cano-wgMLST_BacCompare, to enable users to create a wgMLST tree and canonical wgMLST tree automatically from their uploaded bacterial genomes for not only  ...  Hence, we designed a web service tool based on wgMLST-constructed tree topology coupled with the feature selection method to create the "canonical wgMLST (cano-wgMLST) tree."  ...  In this study, by using the feature selection approach, we developed a user-friendly web server named cano-wgMLST_BacCompare to assist users in building a genetic relatedness tree based on the extracted  ... 
doi:10.3389/fmicb.2019.01687 pmid:31396192 pmcid:PMC6668299 fatcat:54ayedydnrelznpngfggalfxni

Your mediators need data conversion!

Sophie Cluet, Claude Delobel, Jérǒme Siméon, Katarzyna Smaga
1998 Proceedings of the 1998 ACM SIGMOD international conference on Management of data - SIGMOD '98  
Due to the development of the World Wide Web, the integration of heterogeneous data sources has become a major concern of the database community.  ...  We also present the architecture, implementation and practical use of the YAT prototype, currently under evaluation within the OPAL* project.  ...  Acknowledgments The authors would like to thank Serge Abiteboul, Daniel Ghan and Anne-Marie Vercoustre for usefur comments on earlier versions of the paper.  ... 
doi:10.1145/276304.276321 dblp:conf/sigmod/CluetDSS98 fatcat:hy2v5l7tszgnlf2hmnjk5x346u

Miro Web: Integrating Multiple Data Sources through Semistructured Data Types

Luc Bouganim, Tatiana Chan-Sine-Ying, Tuyet-Tram Dang-Ngoc, Jean-Luc Darroux, Georges Gardarin, Fei Sha
1999 Very Large Data Bases Conference  
The MIROWeb Esprit project has developed a unique technology to integrate multiple data sources through an object-relational model with semistructured data types.  ...  It addresses the problem of integrating irregular Web sources and regular relational databases through a mediated architecture based on a hybrid model, supporting relational, object and semistructured  ...  Acknowledgments We would like to thank Dana Florescu, Peter Fankhauser, Henri Laude and Patrick Valduriez for their help within the design of the MIROWeb system.  ... 
dblp:conf/vldb/BouganimCDDGS99 fatcat:aotzsvrsqnfmvfs25y7gs4jkqa

ChinaGrid: Making Grid Computing a Reality [chapter]

Hai Jin
2004 Lecture Notes in Computer Science  
Grid computing presents a new trend to distributed computing and Internet applications, which can construct a virtual single image of heterogeneous resources, provide uniform application interface and  ...  The purpose of this paper is to introduce this great grid project to the world completely for the first time.  ...  I also would like to take this opportunity to thank all the experts in ChinaGrid project for their devoting time to this project, and making grid computing a reality in China.  ... 
doi:10.1007/978-3-540-30544-6_2 fatcat:x7wfsimiifeqfoqjjly2ln7uiy

Mining Web Usage within a Local Area Network

Hsin-Chih Lin, Mei-San Choi
2010 International Journal of Engineering and Technology  
In this study, we propose a novel method of mining web usage within a local area network (LAN). The proposed method makes use of Taiwanese Yahoo! (i.e. Yahoo!  ...  According to the category path, web usage statistics can be accumulated from the bottommost level, i.e. a single website, to the topmost level, i.e. the set of all websites.  ...  The proxy server is used to store web pages that have been downloaded through it in advance. When a browser requests to download a web page, the proxy server checks if the web page is already stored.  ... 
doi:10.7763/ijet.2010.v2.161 fatcat:fri5mc6ebvgcjpjyzb6uniss54

A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors

Yi Xie, Shun-Zheng Yu
2009 IEEE/ACM Transactions on Networking  
Entropy of the user's HTTP request sequence fitting to the model is used as a criterion to measure the user's normality. Finally, experiments are conducted to validate our model and algorithm.  ...  An extended hidden semi-Markov model is proposed to describe the browsing behaviors of web surfers.  ...  They also thank the Network Center of Sun Yat-Sen University for their help with the access logs.  ... 
doi:10.1109/tnet.2008.923716 fatcat:ubz5gih5rnh53iihsngftn26ua

A Smart Card-Based Electronic School Absenteeism System for Influenza-Like Illness Surveillance in Hong Kong: Design, Implementation, and Feasibility Assessment

Dennis KM Ip, Eric HY Lau, Hau Chi So, Jingyi Xiao, Chi Kin Lam, Vicky J Fang, Yat Hung Tam, Gabriel M Leung, Benjamin J Cowling
2017 JMIR Public Health and Surveillance  
Our study demonstrated the feasibility of building a large-scale surveillance system riding on a routinely adopted data collection approach and the use of simple system enhancement to minimize workload  ...  Data timeliness and system acceptance remain as key determinants affecting the usefulness of a prospective surveillance system.  ...  They are grateful to all students, parents, teachers, and principals of the 107 schools who participated in this study.  ... 
doi:10.2196/publichealth.6810 pmid:28986338 pmcid:PMC5650675 fatcat:jjkcuxywqzagfevsuae3sudqb4

A prototype WWW literature recommendation system for digital libraries

San‐Yih Hwang, Wen‐Chiang Hsiung, Wan‐Shiou Yang
2003 Online information review (Print)  
The proposed literature recommendation system makes use of the Web usage logs of a literature digital library.  ...  This article describes a service for providing literature recommendations, which is part of a networked digital library project whose principal goal is to develop technologies for supporting digital services  ...  The main objective was to test our four hypotheses. NSYSU-ETD runs on PC Solaris 2.7 and uses Apache 1.3.9 as the Web server.  ... 
doi:10.1108/14684520310481436 fatcat:3mqtk7hd6jffllfhu4jz5ju53u

The Application and Practice of Parallel Cloud Computing in ISP

Zhilan Huang, Guoliang Yang, Shengyong Ding
2011 2011 Sixth Open Cirrus Summit  
In order to deal with massive data processing, C hina T elecom has deployed a platform named distributed service engine, which is based on parallel cloud computing technology.  ...  T his paper describes the design of this platform and how it can be used in telecom industry.  ...  Its philosophy is to use large amounts of commodity computers to build a highly parallel computation and storage platform. Currently, this technology is widely used by internet companies like Yahoo!  ... 
doi:10.1109/ocs.2011.7 fatcat:uwwlvrsyhrckdpefkkd3ga2gpy

On wrapping query languages and efficient XML integration

Vassilis Christophides, Sophie Cluet, Jérǒme Simèon
2000 SIGMOD record  
Modern applications portals, e-commerce, digital libraries, etc. require integrated access to various information sources from traditional RDBMS to semistructured Web repositories, fast deployment and  ...  Because of its exibility, there is an increasing interest in using XML as a middleware model for such applications. XML enables fast wrapping and declarative i n tegration.  ...  In this example, we plan to build a Web site providing access to commercial information about cultural goods 1 .  ... 
doi:10.1145/335191.335395 fatcat:3t6hja7ucnddfjkad5crrch57u
« Previous Showing results 1 — 15 out of 249 results